US7373669B2 - Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements - Google Patents

Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements Download PDF

Info

Publication number
US7373669B2
US7373669B2 US10/640,826 US64082603A US7373669B2 US 7373669 B2 US7373669 B2 US 7373669B2 US 64082603 A US64082603 A US 64082603A US 7373669 B2 US7373669 B2 US 7373669B2
Authority
US
United States
Prior art keywords
database
transaction
key value
query
records
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US10/640,826
Other versions
US20050039036A1 (en
Inventor
Ori Eisen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
41st Parameter Inc
Original Assignee
41st Parameter Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 41st Parameter Inc filed Critical 41st Parameter Inc
Priority to US10/640,826 priority Critical patent/US7373669B2/en
Publication of US20050039036A1 publication Critical patent/US20050039036A1/en
Assigned to THE 41ST PARAMETER INC. reassignment THE 41ST PARAMETER INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EISEN, ORI
Application granted granted Critical
Publication of US7373669B2 publication Critical patent/US7373669B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching

Definitions

  • This invention relates to data analysis and more specifically to the analysis of data for possible or probable fraud or error and for correspondingly minimizing the liability and exposure of individuals and/or entities as a consequence of compromised credit card information.
  • a single data field taken from a suspected fraudulent transaction or entry is used to track all related transactions or entries and in the case of credit card transactions used to minimize liability to the credit card company and the proper credit card holder.
  • the invention can detect additional fraudulent or “hidden” entities which may have used a common (and probably compromised) data key value and/or element to the originally suspected fraudulent or error-containing transaction or entry. This helps to search for transactions, identities and information that otherwise wish to remain hidden.
  • the present method can help with maintaining financial records, eliminating or reducing money laundering, tracking fraud and/or terrorism and preventing the use of compromised information in the same or other databases by those who otherwise wish to conceal their improper transactions, entries and/or identities.
  • the project currently in its nascent stages, depends or will depend at least in part on analyzing data, especially transactional and credit card transactional data, to discover patterns of activity that will lead the authorities to the whereabouts and identities (and possibly their plans and objects) of terrorists and their organizations.
  • the present invention is also applicable to matters of lesser importance than national security, e.g., determining if a stolen credit card has been used or its number compromised and unauthorizedly used one or more times by another or many others. These thieves often try to establish new transactions with the same credit card number, and/or identity.
  • Identity theft is today a serious problem.
  • the present invention seeks to minimize the use of key information obtained by one who improperly gains access to a credit card transaction and uses the information, not just the credit card number, to his unlawful advantage.
  • Transactional data can be analyzed, one transaction at a time for indications of possible fraud or error.
  • fraud occurs when incorrect information is deliberately included in a credit card-type or identify verifying-like transaction, typically to deceive the recipient of the data into releasing goods, services or information.
  • the most common example is when a stolen card or number is used to buy goods over the internet (or telephone) with the goods being sent to a different address than that normally associated with the credit card holder.
  • Error occurs when incorrect information is inadvertently included in the transactional record.
  • a single credit card transaction over the phone or internet can include a name, a billing address (including street, city, state, zip code, country, etc.), an e-mail address, a credit card number, a shipping address; and an expiration date for the credit card.
  • the actual residence or business location for billing purposes corresponding to the zip code of the shipping address can be compared.
  • the business address (number and street, along with town or city) can also be compared to the actual city and state corresponding to the given zip code. If there is a discrepancy, an error or fraud can be suspected. If the given zip code in the transaction corresponds to the actual zip code of the information on a database, then there is a greater possibility that the transaction is legitimate.
  • IP Internet Protocol
  • the host name or number of the Internet Protocol (“IP”) source address can be used with a reverse IP lookup utility database to determine if the recorded host name in the database is associated with the now given source address. This, too, can be useful in detecting error or possible fraud.
  • Information corresponding to the automatically transmitted host name can also be compared with information manually entered in the online transaction. For example, if the host is located in Weg and the address submitted in the transaction is Japan, then the transaction seems suspect.
  • This, according to the present invention, is basically accomplished by connecting all of “the dots” by using information in the database in a thorough and scientific way (vs. random).
  • the invention is a method for detecting fraudulent or erroneous data from a transaction data set.
  • a transaction record thought to have been compromised and having a plurality of key values is selected from a transaction record database.
  • One of the key values is selected from the selected transaction record.
  • the entire transaction record database is then queried for transaction records having the same selected key value.
  • a first record of a database could be considered, even if no fraud is suspected.
  • a first key value taken from it is used as the queried entry for other records to see if it is linked to other transactions or records. All selected key values of the first record are searched through the database. Uncovered records are added to a list. Then, the key values of those records used to search the database (avoiding duplicative queries).
  • a listing of possible erroneous or fraudulent transactions or records is developed.
  • each data or key value element can become a thread from which the entire rug of possible deceit may be woven—no matter which data element or key value you begin with of a record, you will find all related records.
  • a second or subset of transactions of the database is thus compiled of transaction records that contain duplicates of the selected key value(s). So, for example, if the e-mail address of a user appears in two records, those records are put into a possible suspect directory or listing.
  • the records may be legitimate. However, if the names of the identities or addresses of the users in the records having the same e-mail addresses are different or their actual residences, the use of the same e-mail tends to indicate probable fraud. Looking then for additional transactions where the same e-mail address is used, or the same home residence, may uncover additional fraudulent transactions. At least one other key value is also selected from the original transaction record, and the transaction record database is queried for all transaction records having the second key value.
  • the results of the second and any subsequent queries are added to the second database, i.e., the possible suspect directory or listing.
  • the main database record is considered to be queried for a key value
  • that query is first checked to the list of queries so that the same query will not be repeated on the database. If already done, it is not repeated. If not done, it is added to the query list and done.
  • This is economic, efficient, and eliminates possible endless processing loops by the compiler.
  • a list of queried key values is compiled into a key value database so as to prevent the same query from being used more than once. Risk coefficients, corresponding to probabilities of error or fraud, are assigned to the results of the queries as a listing of the transaction records satisfying the queries is compiled in the second or suspected transaction listing is created.
  • a new query is then made of the transaction record database with either a new key value from the same transaction record initially selected and/or with a new key value from a different record in the transaction record database.
  • risk coefficients are assigned to the transaction records in the second database based on the type, quality, or number of queried (or flagged) and common key values a given transaction record has and/or based on the number of transaction records in the second database having a given matching key value.
  • the key values of the transaction records in the transaction record database for credit card-type transactions correspond to identification data, including but not limited to a credit card number, a bank account number, a name, an address, an e-mail address, a telephone number, a fax number, a social security number, a merchant identification number, and a product identification number.
  • identification data including but not limited to a credit card number, a bank account number, a name, an address, an e-mail address, a telephone number, a fax number, a social security number, a merchant identification number, and a product identification number.
  • patterns of purchasing or transactions in general, i.e., the method and system can be used with reference to applications for passports, for a visa, for a driver's license, for loan applications to a financial institution, etc.
  • the method and system of the present invention can be used with multiple databases to determine possible error and fraud.
  • the databases can be widely varied, as briefly just referred to, and more, of course. For the purposes of the
  • the present invention can advantageously detect the risk of fraud or error in a record of a credit card transaction by comparing selected identification data (often referred to as “key values” of one record to the corresponding “key values” in the other records of other transactions in the database.
  • key values of one record
  • a “key value” means and includes but is not limited to a credit card number, a name, an address, an e-mail address, a “ship to” address, etc.
  • even an internally consistent transaction for example, where the address and zip code are correct, but where the transaction is otherwise fraudulent or erroneous can be detected as a higher risk transaction.
  • the method and system work best when a suspected transaction of fraud is the first record to be considered and a key value selected from that transaction but the method and system can also be used on an entire database by using certain (or all) key values from any one or more records and then querying the entire database to determine instances of common usage, overlap, and possible fraud or error.
  • the essence of the invention is to link known stolen credit card information or fraud with all potential or actual fraud that can be found through comparing key values, both direct matches and also by use of “like” statements for fuzzy-logic matching.
  • a record of each credit card transaction is stored in a database.
  • Each record can be a correlated set of data that can correspond to a single credit card type transaction whether conducted online, by telephone, in person or in another credit card transaction.
  • the record contains two or more fields of information, also known as “keys.”
  • each record for an online type of credit card transaction can have the keys “unique record identifier;” “name of credit card holder;” “street address;” “city;” “country;” “state;” “e-mail address;” and “credit card number.”
  • the key in each of the fields of a credit card transaction record has a value, whether arithmetic, letters, symbols, or a combination of the same.
  • the “unique record identifier” key in one record may have the value “B000139;” the “name of credit card holder” key may have the value “Sanford Q. Burns” ; the e-mail address may have the value “Sburns@LLBL.com,” etc.
  • a “data set” can be compiled of all records taken from the master database having certain of the same key values or by using fuzzy logic, related or close to identical key values. The records in the master or transaction database can be reviewed and compared by using a database query language, such as SQL.
  • one record in the case of credit card transactions, a suspected compromised credit card number
  • a key value for example, the credit card number or the e-mail address
  • the initial record selected from the database or set can be one that is known or suspected to be fraudulent or erroneous.
  • a record having a credit card key value equal to a credit card number that has been reported to have been stolen can be a good candidate for the starting record.
  • the key value that can be selected from this record can be the credit card number key value or the e-mail address of the user (or the user's name or identity).
  • the transaction database is then searched for all records having the same key value as the selected key value, i.e., the compromised or stolen credit card number or the e-mail address.
  • the transaction database or set is searched for all records having the same stolen credit card number or e-mail address.
  • the new records so identified are copied to a second data set called the DataDistinct Data Set.
  • a Query Listing showing each of the selected key values which are used for the search of the entire database is recorded and updated each time that the database is reviewed with a new “key value.” Then, at least one other key value from the initial record (or from one of the revealed transactions which used the same credit card number) can be selected, and the transaction data set searched for all records having identical key values to the second selected key value.
  • the initial fraudulent record in addition to the stolen credit card number, includes an e-mail address, e.g., “ersatz64@earth.com,” then all of the other records in the transaction database are searched for the value corresponding to the same e-mail address or second key value used in the transaction record having the compromised credit card number. If a second record is found with the same credit card number which was reported as stolen, then the key value, for example, of the e-mail address of that transaction, may be used to detect other transactions with the same e-mail address, even though they may not have used the same credit card number. This transaction, too, may be suspect. The entire database is searched for that key value, the list of Query Listings of key values updated, etc.
  • the underlying assumption is that an entity submitting fraudulent transaction information may reuse at least part of the same information from transaction to transaction.
  • the key values of the found records can be used as the basis for still further searching. In this way, a cluster of related fraudulent transactions can be uncovered for further investigation.
  • the mechanism for formulating and tracking the queries can include placing each query into a list of Query Listings or a data set called SQLCodes.
  • SQLCodes the query itself can be the primary key, so that if any duplicate query (a query identical to one already asked) is generated, it cannot be added to SQLCodes, and the query is advantageously not rerun.
  • queries can be generated much faster than new records are added to the DataDistinct Data Set. So new queries are queued in the SQLCodes data set, and can be run sequentially, or in any other suitable order.
  • Record 3 is identified as a likely fraudulent transaction, for example, because credit card number 78989 has been reported as stolen. Pursuant to the method of the present invention, Record 3 is selected for use of its Key Values and application of those key values to the remainder of the database to determine whether other transactions, even if they have used other credit card numbers, are likely fraudulent:
  • a query is first generated to select all records from the transaction database or set (consisting, in the example, of thousands of Transaction Identifiers 1 -x; although number 3 need not be considered in the next step) that have the same or a similar or fuzzy logic-related key value as a selected key value Record 3 .
  • the Query ID# field is the query identifier
  • “Ran” is an indicator or “flag” of instructions to the user or processor that indicates if the query has yet been run against the balance of the transaction database or set.
  • the system is designed to run each of the SQLCodes Data Set queries until all Query ID#'s are reflected as “Yes” under the Ran Query.
  • the default value of Ran can and should be “No.”
  • the indicator or Ran flag is set to “Yes.”
  • a Ran inquiry results in a NULL or empty set, the system or method is complete.
  • each “No” indicator directs the system to run that query on the Transaction Data Base.
  • the SQLCodes Data Set or Query Listing field can be initially set at the primary key value, i.e. the credit card number which is thought to have been stolen or compromised.
  • the primary key e.g., the credit card number or the e-mail address
  • Query ID # 1 can be actually run against the entire transaction data set, and all records containing the e-mail address “joe@aol.com” are selected and copied to the DataDistinct Data Set (which already contains the initial transaction under scrutiny). In the example, this will result in the DataDistinct Data Set looking as follows:
  • the Transaction Identifier is the identifier for a record in the original Data Base or Set. It can be set, alternatively, as a new number for the Data Distinct Data Set. Meanwhile, the Run flag for Query 1 in the SQLCodes Data Set or Query Listing is changed to “Yes.” This will prevent needlessly rerunning that query.
  • Query 2 relating to the credit card number, can then be run, which copies two additional records (Records 164 and 328 ) to the DataDistinct data set:
  • This procedure can generate duplicate potential queries.
  • the present invention advantageously prevents repeat searches based upon such duplications by the use of the SQLCodes Data Set.
  • the query is designated to be a primary key. So any query that is a duplicate of a query already in the SQLCodes Data Set cannot be added and will not be re-run. Since the queries are run from the SQLCodes Data Set, the duplicate query will not be run. This elegant solution prevents repeat searches of the Transaction Data Set for the same records using the same keys or values.
  • duplicate records may or may not be added to the DataDistinct Data Set.
  • Record 4 will be selected a first time by Query 1 because Record 4 has a key value where the e-mail address joe@aol.com is present.
  • Duplicate records can be excluded from the DataDistinct Data Set by making the DataDistinct Data Set record identifier the same as the transaction data set record identifier, and then making the DataDistinct Data Set and only adding to the Data Distinct Data Set when a new Transaction Identifier is located and found.
  • the records that have been determined to be directly or indirectly related to a bad record can, if desired, be copied into a Suspect Data Set, and can be assigned an indicator or value as to the risk associated with each record, group of records, or the whole Suspect Data Set considered highly suspect.
  • a record can be placed into a High Risk Data Set, a Medium Risk Data Set, or a Low Risk Data Set (types of Suspect Data Sets), depending upon the risk level associated with the record and the common use of the key values and their characteristics.
  • the Suspect Data Set may include:
  • the indications of risk level can be made in accordance with any suitable rule.
  • a record that an e-mail address with a different name and credit card number may be considered a risk level of “High.”
  • a record that shares the credit card key value with no more than one other key value of a record is accorded a risk level of “Medium” since many family members may share a credit card but have different e-mail addresses and names.
  • Transactions can be treated according to their risk level. For example, high risk transactions can be automatically rejected. Medium risk transactions can be referred to a human researcher for further investigation. Low risk transactions can be automatically accepted and processed.
  • a key value can be used as the basis for searching for similar key values in other records in the transaction data base or set, not only identical records.
  • the keys can be searched in multiple databases, such as looking for people with the claimed same SSN, Driver License numbers and Passports and all their combinations.
  • the uncovering of 78989 as the value for several credit card numbers in a few transactions may cause the method to run a Query Listing where e-mail name is “alphonse@nrta.edu” or wilma@stone.net. If the DataDistinct Data Set results in additional transactions which use the same CCN, the same e-mail name values, but different name values, these transactions, too, can be added to the Suspect Data Set. As transactions and key values are added to the Data Distinct Data Set of transactions, the system keeps on looking in the SQLCodes for new key values.
  • the system is run with the key value seeking other transactions with the same e-mail address: joe@aol.com. This may or may not uncover other records but if it does, they are added to the DataDistinct Data Set. Then the system looks for the common transactions with CCN of the first transaction and records them, too, unless already indicated on the Data Distinct Data Set. Then, the database is run for the Name key value. After those logic runs are performed, the next transaction recorded in the DataDistinct Data Set is looked at. If the e-mail query is the same as that already done, it is not redone.
  • wildcards can be used to detect similar (as well as identical) records. For example, if numerous bad transactions have been detected with e-mail key values that conform to *@whodunnit.com, where “*” is a wildcard, that can represent any string of any length, then a query can be formulated: SELECT Email FROM DataSet WHERE (EMAIL IS LIKE “*@whodunnit.com”).
  • This query can advantageously identify all records having e-mail key values with the domain name “whodunnit.com”, such as “al@whodunnit.com” smith@whodunnit.com”, etc.
  • any wildcard can be used in formulating such queries. For example, “!” can represent any single character.
  • Other Boolean expressions e.g., AND, OR, etc.

Abstract

A method of detecting fraudulent or erroneous data from a transaction data set is provided. A first transaction record having a plurality of key values is selected from a transaction record database. One of the key values is selected from the selected transaction record. The transaction record database is then queried for transaction records having the selected key value. A second database is compiled of transaction records that contain the selected key value. At least one other key value is then selected from the originally selected transaction record, and the transaction record database is again queried for transaction records also having the second key value. The results of the fist, second and any subsequent queries are added to a second or a suspect transaction database. Then, using the uncovered records, the transaction database is queried for the use of key values common to the uncovered set of transactions to see if additional records are suspect. A list of queried key values is maintained to prevent the unnecessary or redundant use of the same query of the transactions. Risk coefficients of levels of fraud or mistake are assigned to the transaction records which have one or more common key values to the records uncovered as a consequence of the database queries.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to data analysis and more specifically to the analysis of data for possible or probable fraud or error and for correspondingly minimizing the liability and exposure of individuals and/or entities as a consequence of compromised credit card information. A single data field taken from a suspected fraudulent transaction or entry is used to track all related transactions or entries and in the case of credit card transactions used to minimize liability to the credit card company and the proper credit card holder. The invention can detect additional fraudulent or “hidden” entities which may have used a common (and probably compromised) data key value and/or element to the originally suspected fraudulent or error-containing transaction or entry. This helps to search for transactions, identities and information that otherwise wish to remain hidden. The present method can help with maintaining financial records, eliminating or reducing money laundering, tracking fraud and/or terrorism and preventing the use of compromised information in the same or other databases by those who otherwise wish to conceal their improper transactions, entries and/or identities.
2. Description of Related Art
Nearly every business and individual in the United States and around the globe depends on the accurate and secure maintenance of data such as financial and identity-related data. Data is compiled in many different formats, but one format of particular interest in remaining uncompromised and unused by unauthorized individuals is transactional data, e.g., the use of a person's credit card to purchase goods or services. It is crucial to ensure that credit card information does not become stolen, compromised or erroneously recorded. In these situations, the consumer and the credit card company suffer the loss while the thief or thieves of the information improperly use it to effectively pillage and loot (and to hide from authorities). In the case of the erroneous, in contrast to fraudulent, recordation of credit card information, while inadvertently assigning a transaction (and debiting an account) to the wrong person may be a malice-free mistake, it still causes great consternation for all parties concerned. Errors in credit card transactions have economic costs, too, and, therefore, the elimination or reduction of errors as well as fraud is desirably sought.
The review of transactional data such as on-line credit card based-purchases for error or fraud has become an important tool in rooting out terrorist operations. The Defense Advanced Research Projects Agency has recently begun a program alternatively called Total Information Awareness and the less draconian-sounding Terrorism Information Awareness (TIA) program or plan, the purpose of which is to detect and defeat a terrorist attack before it occurs by using and analyzing available databases, financial and other forms of information. One of the proposed goals of TIA is to “connect the dots” of terrorism-related activity so that the ultimate result of the activity (i.e., an attack) is not realized. The project, currently in its nascent stages, depends or will depend at least in part on analyzing data, especially transactional and credit card transactional data, to discover patterns of activity that will lead the authorities to the whereabouts and identities (and possibly their plans and objects) of terrorists and their organizations. Of course, the present invention is also applicable to matters of lesser importance than national security, e.g., determining if a stolen credit card has been used or its number compromised and unauthorizedly used one or more times by another or many others. These thieves often try to establish new transactions with the same credit card number, and/or identity. Identity theft is today a serious problem. The present invention seeks to minimize the use of key information obtained by one who improperly gains access to a credit card transaction and uses the information, not just the credit card number, to his unlawful advantage.
Transactional data can be analyzed, one transaction at a time for indications of possible fraud or error. As used herein, fraud occurs when incorrect information is deliberately included in a credit card-type or identify verifying-like transaction, typically to deceive the recipient of the data into releasing goods, services or information. The most common example is when a stolen card or number is used to buy goods over the internet (or telephone) with the goods being sent to a different address than that normally associated with the credit card holder. Error occurs when incorrect information is inadvertently included in the transactional record. For example, a single credit card transaction over the phone or internet can include a name, a billing address (including street, city, state, zip code, country, etc.), an e-mail address, a credit card number, a shipping address; and an expiration date for the credit card. The actual residence or business location for billing purposes corresponding to the zip code of the shipping address can be compared. The business address (number and street, along with town or city) can also be compared to the actual city and state corresponding to the given zip code. If there is a discrepancy, an error or fraud can be suspected. If the given zip code in the transaction corresponds to the actual zip code of the information on a database, then there is a greater possibility that the transaction is legitimate. If the transaction is being done online, the host name or number of the Internet Protocol (“IP”) source address can be used with a reverse IP lookup utility database to determine if the recorded host name in the database is associated with the now given source address. This, too, can be useful in detecting error or possible fraud. Information corresponding to the automatically transmitted host name can also be compared with information manually entered in the online transaction. For example, if the host is located in Croatia and the address submitted in the transaction is Japan, then the transaction seems suspect.
Examining the information in a single transaction, as just discussed, can be useful in determining the risk of fraud or error within that transaction. However, certain transactions that contain fraudulent or erroneous information are, nevertheless, internally consistent. For example, even though a city and state address is deliberately incorrect and thus fraudulent (i.e., as entered by the thief/terrorist), the provided zip code corresponds to that city and state. Hence, there is no discrepancy between the zip code and the city and state, so the purely internal detection method discussed above would not indicate fraud or error. Likewise, the reverse IP lookup of an online transaction can reveal a host located in the same location/country as is indicated in the city and country manually submitted in the transaction, again, even though such information is fraudulent. A method is believed needed to detect possible fraud or error in transaction information, even when it is internally consistent, one record considered at a time. By linking known fraud (as when a credit card has been reported as stolen) with possible or potential fraud, eliminating or reducing fraud can be accomplished.
This, according to the present invention, is basically accomplished by connecting all of “the dots” by using information in the database in a thorough and scientific way (vs. random).
SUMMARY OF THE INVENTION
It is an object of the invention to provide a method of detecting the presence of fraudulent or erroneous data in a transaction database. Rather, once one suspicious record in a database, a credit card transaction, for example, is identified, a rogue data element is considered and used to search for related records. So, for example, if you begin with one credit card number as having thought to be compromised, the email address associated therewith can be used to determine if further usages of it may lead to other transactions which may be fraudulent. This second transaction, then, can be linked to other transactions with the same credit card or not and so on. Using that logic and method, one can build a “tree” of information that will finish “growing” when all combinations derived from the initial data element are done. Then, key values of the second or additional related transactions can be used to search the database to determine if there are additional transactions which may be suspect.
It is another object of the invention to provide a method for detecting fraudulent or erroneous data in a transaction database in which the same data queries are not run multiple times. This shows the elegance of the present invention and its efficiency of operation. It is an aspect of the present invention to ensure that the same data queries are not repeatedly “run” through the database but, rather, a listing of the data queries is maintained and each time a new query is considered, before it is run on the database, it is first checked against already considered and run queries to determine the necessity of running the query. This is efficient and methodical.
It is another object of the invention to provide a method for detecting fraudulent or erroneous data in a transaction database in which patterns of errors or fraud are detectable.
The above and other objects are fulfilled by the invention, which is a method for detecting fraudulent or erroneous data from a transaction data set. A transaction record thought to have been compromised and having a plurality of key values is selected from a transaction record database. One of the key values is selected from the selected transaction record. The entire transaction record database is then queried for transaction records having the same selected key value. Alternatively, a first record of a database could be considered, even if no fraud is suspected. Then, a first key value taken from it is used as the queried entry for other records to see if it is linked to other transactions or records. All selected key values of the first record are searched through the database. Uncovered records are added to a list. Then, the key values of those records used to search the database (avoiding duplicative queries). A listing of possible erroneous or fraudulent transactions or records is developed.
As mentioned, after the key values of the first record are searched through the database, subsequent records could be similarly used, a key value at a time, to see if possible fraud or error exists in the transaction record database or portion thereof. Another way to describe how the method of the invention is intended to work, is possibly analogizing it to tapestry. Each data or key value element can become a thread from which the entire rug of possible deceit may be woven—no matter which data element or key value you begin with of a record, you will find all related records. A second or subset of transactions of the database is thus compiled of transaction records that contain duplicates of the selected key value(s). So, for example, if the e-mail address of a user appears in two records, those records are put into a possible suspect directory or listing. If the home addresses, however, and names of the identity for the records are the same, then the records may be legitimate. However, if the names of the identities or addresses of the users in the records having the same e-mail addresses are different or their actual residences, the use of the same e-mail tends to indicate probable fraud. Looking then for additional transactions where the same e-mail address is used, or the same home residence, may uncover additional fraudulent transactions. At least one other key value is also selected from the original transaction record, and the transaction record database is queried for all transaction records having the second key value.
The results of the second and any subsequent queries are added to the second database, i.e., the possible suspect directory or listing. Each time that the main database record is considered to be queried for a key value, that query is first checked to the list of queries so that the same query will not be repeated on the database. If already done, it is not repeated. If not done, it is added to the query list and done. This is economic, efficient, and eliminates possible endless processing loops by the compiler. Thus, a list of queried key values is compiled into a key value database so as to prevent the same query from being used more than once. Risk coefficients, corresponding to probabilities of error or fraud, are assigned to the results of the queries as a listing of the transaction records satisfying the queries is compiled in the second or suspected transaction listing is created.
A new query is then made of the transaction record database with either a new key value from the same transaction record initially selected and/or with a new key value from a different record in the transaction record database. Once the second database (or suspect listing) is compiled (or while it is being compiled), risk coefficients are assigned to the transaction records in the second database based on the type, quality, or number of queried (or flagged) and common key values a given transaction record has and/or based on the number of transaction records in the second database having a given matching key value.
The key values of the transaction records in the transaction record database for credit card-type transactions correspond to identification data, including but not limited to a credit card number, a bank account number, a name, an address, an e-mail address, a telephone number, a fax number, a social security number, a merchant identification number, and a product identification number. In this way, patterns of purchasing (or transactions in general, i.e., the method and system can be used with reference to applications for passports, for a visa, for a driver's license, for loan applications to a financial institution, etc.) can be reviewed and instances of fraud or error may emerge. The method and system of the present invention can be used with multiple databases to determine possible error and fraud. The databases can be widely varied, as briefly just referred to, and more, of course. For the purposes of the present description, however, I have focused on credit card transactions for ease of illustration, it being understood, however, that the invention is far broader than that specific application.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
The present invention can advantageously detect the risk of fraud or error in a record of a credit card transaction by comparing selected identification data (often referred to as “key values” of one record to the corresponding “key values” in the other records of other transactions in the database. In this connection, for example, and in specific reference to the type of transaction used for illustrative purposes, a credit card transaction, a “key value” means and includes but is not limited to a credit card number, a name, an address, an e-mail address, a “ship to” address, etc. According to the present invention, even an internally consistent transaction, for example, where the address and zip code are correct, but where the transaction is otherwise fraudulent or erroneous can be detected as a higher risk transaction.
The method and system work best when a suspected transaction of fraud is the first record to be considered and a key value selected from that transaction but the method and system can also be used on an entire database by using certain (or all) key values from any one or more records and then querying the entire database to determine instances of common usage, overlap, and possible fraud or error. In the credit card scenerio, the essence of the invention is to link known stolen credit card information or fraud with all potential or actual fraud that can be found through comparing key values, both direct matches and also by use of “like” statements for fuzzy-logic matching.
In accordance with an embodiment of the present invention, a record of each credit card transaction is stored in a database. Each record can be a correlated set of data that can correspond to a single credit card type transaction whether conducted online, by telephone, in person or in another credit card transaction. The record contains two or more fields of information, also known as “keys.” For example, each record for an online type of credit card transaction can have the keys “unique record identifier;” “name of credit card holder;” “street address;” “city;” “country;” “state;” “e-mail address;” and “credit card number.” The key in each of the fields of a credit card transaction record has a value, whether arithmetic, letters, symbols, or a combination of the same. For example, the “unique record identifier” key in one record may have the value “B000139;” the “name of credit card holder” key may have the value “Sanford Q. Burns” ; the e-mail address may have the value “Sburns@LLBL.com,” etc. A “data set” can be compiled of all records taken from the master database having certain of the same key values or by using fuzzy logic, related or close to identical key values. The records in the master or transaction database can be reviewed and compared by using a database query language, such as SQL.
In accordance with an embodiment of the present invention, one record (in the case of credit card transactions, a suspected compromised credit card number) from an online credit card transaction database or set is selected, and a key value (for example, the credit card number or the e-mail address) for the record is selected. The initial record selected from the database or set can be one that is known or suspected to be fraudulent or erroneous. For example, a record having a credit card key value equal to a credit card number that has been reported to have been stolen can be a good candidate for the starting record. The key value that can be selected from this record can be the credit card number key value or the e-mail address of the user (or the user's name or identity).
The transaction database is then searched for all records having the same key value as the selected key value, i.e., the compromised or stolen credit card number or the e-mail address. In the above example, the transaction database or set is searched for all records having the same stolen credit card number or e-mail address. The new records so identified are copied to a second data set called the DataDistinct Data Set. A Query Listing showing each of the selected key values which are used for the search of the entire database is recorded and updated each time that the database is reviewed with a new “key value.” Then, at least one other key value from the initial record (or from one of the revealed transactions which used the same credit card number) can be selected, and the transaction data set searched for all records having identical key values to the second selected key value. For example, if the initial fraudulent record, in addition to the stolen credit card number, includes an e-mail address, e.g., “ersatz64@earth.com,” then all of the other records in the transaction database are searched for the value corresponding to the same e-mail address or second key value used in the transaction record having the compromised credit card number. If a second record is found with the same credit card number which was reported as stolen, then the key value, for example, of the e-mail address of that transaction, may be used to detect other transactions with the same e-mail address, even though they may not have used the same credit card number. This transaction, too, may be suspect. The entire database is searched for that key value, the list of Query Listings of key values updated, etc. The underlying assumption is that an entity submitting fraudulent transaction information may reuse at least part of the same information from transaction to transaction. When all of the key values of the initial fraudulent record have been used to find other records in the transaction database, the key values of the found records can be used as the basis for still further searching. In this way, a cluster of related fraudulent transactions can be uncovered for further investigation.
The mechanism for formulating and tracking the queries can include placing each query into a list of Query Listings or a data set called SQLCodes. In SQLCodes, the query itself can be the primary key, so that if any duplicate query (a query identical to one already asked) is generated, it cannot be added to SQLCodes, and the query is advantageously not rerun. In essence, queries can be generated much faster than new records are added to the DataDistinct Data Set. So new queries are queued in the SQLCodes data set, and can be run sequentially, or in any other suitable order.
A more detailed example follows: Consider a transaction database of online credit card transactions comprising a set that includes thousands of records, 7 of which are listed below, with each record having values for the keys values “Transaction Identifier;” “User Name;” “E-Mail Address;” and “Credit Card Number” as follows:
Transaction Data Base
Transaction Credit Card
Identifier User Name E-Mail Address Number
1 Alan al@aol.com 12345
2 Daniel dan@earth.com 45287
3 Joe joe@aol.com 78989
4 Phil joe@aol.com 12345
5 Carl carl@sylix.com 45287
.
.
.
164 Tracey alphonse@nrta.edu 78989
.
.
.
328 Wilma wilma@stone.net 78989
.
.
.
Record 3 is identified as a likely fraudulent transaction, for example, because credit card number 78989 has been reported as stolen. Pursuant to the method of the present invention, Record 3 is selected for use of its Key Values and application of those key values to the remainder of the database to determine whether other transactions, even if they have used other credit card numbers, are likely fraudulent:
Transaction
Identifier User Name E-Mail Address Credit Card Number
3 Joe joe@aol.com 78989

A query is first generated to select all records from the transaction database or set (consisting, in the example, of thousands of Transaction Identifiers 1-x; although number 3 need not be considered in the next step) that have the same or a similar or fuzzy logic-related key value as a selected key value Record 3. For example, the query “SELECT Email FROM DataSet WHERE (EMAIL=‘Joe@aol.com’)” is generated. It could, of course, be a query for the user's home address, or the IP address used for the online transaction, whatever keys and key values are maintained in the records. In the example, however, for simplicity it is the query for the e-mail name given by the user of the credit card number under consideration in the transaction. This query (for the e-mail address) is then added to an SQLCodes Data Set or Query Listing table:
SQLCodes Data Set
Query ID# Query Ran
1 SELECT Email FROM DataSet WHERE No
(EMAIL=‘joe@aol.com’)

The Query ID# field is the query identifier, and “Ran” is an indicator or “flag” of instructions to the user or processor that indicates if the query has yet been run against the balance of the transaction database or set. The system is designed to run each of the SQLCodes Data Set queries until all Query ID#'s are reflected as “Yes” under the Ran Query. The default value of Ran can and should be “No.” After the SQL query has been run (i.e., the question has been asked by the computer system of the transaction database or set and the results entered into the DataDistinct Data Set), the indicator or Ran flag is set to “Yes.” When a Ran inquiry results in a NULL or empty set, the system or method is complete. Until then, each “No” indicator directs the system to run that query on the Transaction Data Base. The SQLCodes Data Set or Query Listing field can be initially set at the primary key value, i.e. the credit card number which is thought to have been stolen or compromised. One of the advantages of using the SQLCodes Data Set is that it will enable the investigator to know whether a particular query was entered or not. Other advantages of maintaining a listing of the queried key values is to allow instant access by the investigator as to which query has already been run against the transaction database or set; to know how many queries there are; and how many have been run; and to limit the queries to one type of each (to reduce redundancy). By first setting the Query Listing field to the primary key e.g., the credit card number or the e-mail address, one also is given knowledge of which question is next (e.g., by issuing the command, “Select SQL FROM SQLCodes WHERE (Ran=No”); to know when one is finished asking questions (e.g., receiving a null return value from the query, “Select SQL FROM SQLCodes WHERE (Ran=No”); and to have an audit trail that can show how a “tree” of related records was developed by following the Query Listing or SQLCodes sequence.
After the first key value is considered for being run or after it is actually searched through the Transaction Data Base and all records with the same e-mail address posted to the DataDistinct Data Set, another key value taken from Record 3 can be used as the basis of a second query of the entire database. For example, the query “SELECT CCN FROM DataSet WHERE (CCN=‘78989)” is generated, where “CCN” is shorthand for “credit card number.” This query is then added to the SQLCodes Data Set or Query Listing:
SQLCodes Data Set
Query ID# Query Ran
1 SELECT Email FROM DataSet WHERE No
(EMAIL=‘joe@aol.com’)
2 SELECT CCN FROM DataSet WHERE No
(CCN=‘78989)

Also, the query “SELECT Name FROM DataSet WHERE (NAME=Joe)” can be generated and added to the SQLCodes Data Set or Query Listing:
SQLCodes Data Set
Query ID# Query Ran
1 SELECT Email FROM DataSet WHERE No
(EMAIL=‘joe@aol.com’)
2 SELECT CCN FROM DataSet WHERE No
(CCN=‘78989)
3 SELECT Name FROM DataSet WHERE No
(NAME=Joe)
Once the initial SQLCodes Data Set or Query Listing is finished, Query ID #1 can be actually run against the entire transaction data set, and all records containing the e-mail address “joe@aol.com” are selected and copied to the DataDistinct Data Set (which already contains the initial transaction under scrutiny). In the example, this will result in the DataDistinct Data Set looking as follows:
DataDistinct Data Set
Transaction
Identifier Name E-Mail Credit Card Number
3 Joe joe@aol.com 78989
4 Phil joe@aol.com 12345

The Transaction Identifier is the identifier for a record in the original Data Base or Set. It can be set, alternatively, as a new number for the Data Distinct Data Set. Meanwhile, the Run flag for Query 1 in the SQLCodes Data Set or Query Listing is changed to “Yes.” This will prevent needlessly rerunning that query. Query 2, relating to the credit card number, can then be run, which copies two additional records (Records 164 and 328) to the DataDistinct data set:
DataDistinct Data Set
Transaction
Identifier Name E-Mail Credit Card Number
3 Joe joe@aol.com 78989
4 Phil joe@aol.com 12345
164 Tracey alphonse@nrta.edu 78989
328 Wilma wilma@stone.net 78989

Records 164 and 328 have no other key values in common with records 3 or 4, except the credit card key value 78989. The discovery of these additional records increases the magnitude or probability of risk associated with all of the selected records (3, 4, 164 and 328), because several apparently unrelated individuals, some with different e-mail addresses do not ordinarily share the same credit card number, unless the number is stolen and it has been compromised. Therefore, each of these transactions is assigned a “risk” of being fraudulent or erroneous, and some corrective or further investigative action can be taken. Such appropriate action can range from further investigation to automatically blocking the fulfillment of the transactions or at least until the investigation is complete.
Next, Query 3 is run, but, in our example, there is no other record in the transaction data set that has a key value of “SELECT Name FROM DataSet WHERE (NAME=Joe)”. No records are added to the DataDistinct Data Set. Nevertheless, the flag for the “Ran” for Query #3 is changed to “Yes.”
The same procedure can be repeated now for another record in the DataDistinct Data Set, such as Record 4. There is no need to run the e-mail address Query Listing for “SELECT Email FROM DataSet WHERE (EMAIL=‘joe@aol.com’)”, since the Query Listing or SQLCodes Data Set indicator already indicates that that query has been run. However, the Query Listing for the credit card number, SELECT CCN FROM DataSet WHERE (CCN=‘12345’)”, is added to the SQLCodes Data Set or Query Listing and then run for all remaining records. Then, the name query “SELECT Name FROM DataSet WHERE (NAME=Phil)” for record 4 is considered, first compared to the Query Listing or SQLCodes Data Set to ensure against duplication and, if not present, added to the Query Listing or SQLCodes Data Set and run. Uncovered records are added to the DataDistinct Data Set. Then, the e-mail query for the next transaction is considered, e.g., e-mail=alphonse@nrta.edu; then the CCN query CCN=78989 considered (determined to have been run), then the name query considered (name=Tracey), etc., transaction after transaction. In this fashion, all of the “leads” provided by different key values in records that are directly or indirectly related to an initial fraudulent or compromised record can be followed-up to possibly find other suspect transaction records.
This procedure can generate duplicate potential queries. For example, the key value for the credit card number CCN=78989 occurs in several of the records in the DataDistinct Data Set. So when key values in, say, Record 164 are used as the basis for new queries of the Transaction Data Set, the query “SELECT CCN FROM DataSet WHERE (CCN=′78989)” will be considered, just as it was from the last field of Record 3. The present invention advantageously prevents repeat searches based upon such duplications by the use of the SQLCodes Data Set. In the SQLCodes Data Set, the query is designated to be a primary key. So any query that is a duplicate of a query already in the SQLCodes Data Set cannot be added and will not be re-run. Since the queries are run from the SQLCodes Data Set, the duplicate query will not be run. This elegant solution prevents repeat searches of the Transaction Data Set for the same records using the same keys or values.
However, duplicate records may or may not be added to the DataDistinct Data Set. In the above example, Record 4 will be selected a first time by Query 1 because Record 4 has a key value where the e-mail address joe@aol.com is present. Record 164 and 328 will be added to the DataDistinct Data Set by Query #2 because those records have key values which satisfy the Query Listing for the Credit Card Number=78989. Record #1 will be added to the DataDistinct Data Set by the Query relating to CCN=12345, because of the common use of the e-mail address to both records 3 and 4 which caused the credit card number of record #4 to be suspect and the subject of a Query Listing. Duplicate records can be excluded from the DataDistinct Data Set by making the DataDistinct Data Set record identifier the same as the transaction data set record identifier, and then making the DataDistinct Data Set and only adding to the Data Distinct Data Set when a new Transaction Identifier is located and found.
The records that have been determined to be directly or indirectly related to a bad record can, if desired, be copied into a Suspect Data Set, and can be assigned an indicator or value as to the risk associated with each record, group of records, or the whole Suspect Data Set considered highly suspect. For example, a record can be placed into a High Risk Data Set, a Medium Risk Data Set, or a Low Risk Data Set (types of Suspect Data Sets), depending upon the risk level associated with the record and the common use of the key values and their characteristics. In the above example, the Suspect Data Set may include:
Suspect Data Set
Transaction Credit Card
Identifier Name E-Mail Number Risk
3 Joe joe@aol.com 78989 High
4 Phil joe@aol.com 12345 High
164 Tracey alphonse@nrta.edu 78989 Medium
328 Wilma wilma@stone.net 78989 Medium

The indications of risk level can be made in accordance with any suitable rule. In this example, a record that an e-mail address with a different name and credit card number may be considered a risk level of “High.” A record that shares the credit card key value with no more than one other key value of a record is accorded a risk level of “Medium” since many family members may share a credit card but have different e-mail addresses and names. Transactions can be treated according to their risk level. For example, high risk transactions can be automatically rejected. Medium risk transactions can be referred to a human researcher for further investigation. Low risk transactions can be automatically accepted and processed.
The description of embodiments is meant to illustrate, and not to limit, the true scope of the invention. Those of ordinary skill in the art will appreciate that the scope of the invention extends beyond the examples discussed above. For example, a key value can be used as the basis for searching for similar key values in other records in the transaction data base or set, not only identical records. Also the keys can be searched in multiple databases, such as looking for people with the claimed same SSN, Driver License numbers and Passports and all their combinations. There can be different similarity rules for different key values. For example, a single digit difference in credit card numbers in two records can indicate that two entirely different credit cards were legitimately used in two transactions. However, the name “Al Wilkinson” in one record may be deemed sufficiently similar to the name “A Wilkinson” in another record to select the two records and copy them to the Suspect Data Set. Known techniques, including those involving fuzzy logic, can be advantageously used to match key values in accordance with an embodiment of the present invention.
In the example above, for example, the uncovering of 78989 as the value for several credit card numbers in a few transactions may cause the method to run a Query Listing where e-mail name is “alphonse@nrta.edu” or wilma@stone.net. If the DataDistinct Data Set results in additional transactions which use the same CCN, the same e-mail name values, but different name values, these transactions, too, can be added to the Suspect Data Set. As transactions and key values are added to the Data Distinct Data Set of transactions, the system keeps on looking in the SQLCodes for new key values.
To start the present invention and method, one places a SQL Key Value of a Transaction into the SQL Codes Data Set or Query Listing with the Ran indicator set to “No,” this is what makes the system start with that key value and query and keeps looking for other records using the same key values and then uses other value keys from the same record for building a DataDistinct Data Set. Then, after that first record and its key values are considered for the entire Transaction Data Set, the next record of the Data Distinct DataSet is considered, first by use of its, for example, e-mail name, then its credit card number, CCN, finally its user's name. If not yet used and run, then it is run through the entire Transaction Data Set. If already used and run, determined by comparison to the Query Listing, then the next query listing is used. So at first the system is run with the key value seeking other transactions with the same e-mail address: joe@aol.com. This may or may not uncover other records but if it does, they are added to the DataDistinct Data Set. Then the system looks for the common transactions with CCN of the first transaction and records them, too, unless already indicated on the Data Distinct Data Set. Then, the database is run for the Name key value. After those logic runs are performed, the next transaction recorded in the DataDistinct Data Set is looked at. If the e-mail query is the same as that already done, it is not redone. Then, the system moves onto the CCN query and then the name query, each time looking at all transactions, each time indicating on the SQLCodes Data Set or the Query Listing which queries have already been done, each time changing the query from Ran=No to Ran=Yes. When all key values of all transactions on the Data Distinct Data Set have been performed the results are ranked by probabilities of fraud. When Ran=No equals NULL, i.e., all Queries have been done such that no additional queries need to be run, the system is finished, as there are no more combinations that stem form the initial suspect transaction.
In one embodiment, wildcards can be used to detect similar (as well as identical) records. For example, if numerous bad transactions have been detected with e-mail key values that conform to *@whodunnit.com, where “*” is a wildcard, that can represent any string of any length, then a query can be formulated: SELECT Email FROM DataSet WHERE (EMAIL IS LIKE “*@whodunnit.com”).
This query can advantageously identify all records having e-mail key values with the domain name “whodunnit.com”, such as “al@whodunnit.com” smith@whodunnit.com”, etc. Likewise, any wildcard can be used in formulating such queries. For example, “!” can represent any single character.
Likewise, Boolean expressions can be used in queries. For example, SELECT Email FROM DataSet WHERE (EMAIL=‘*@whodunnit.com’ AND NOT ‘joesmith@whodunnit.com’). This query could be used where the only known legitimate user of an e-mail address containing “whodunnit.com” is userjoesmith. Other Boolean expressions (e.g., AND, OR, etc.) can also be used.
By developing clusters of related transactions, patterns can begin to emerge. For example, if the same credit card number is used over disparate geographical areas at substantially the same time, fraud is suspected. Alternatively, if the credit card number is used to purchase repeated quantities of legal but dangerous materials (e.g., fertilizer and kerosene), a danger signal or flag may be raised that terrorist activity may be afoot.
Having described the invention with regard to specific embodiments, it is to be understood that the above description is not meant as a limitation excluding such further variations or modifications as may be apparent or may suggest themselves to those skilled in the art. The invention is defined by the claims appearing herein below.

Claims (24)

1. A method of detecting fraudulent or erroneous data from a transaction data set, comprising the steps of:
a) selecting a transaction record from a first database comprising a plurality of transaction records for detecting fraudulent or erroneous data, each of the plurality of transaction records having a plurality of key values;
b) selecting a first key value from the transaction record selected in step a);
c) querying the first database for transaction records having the same or related first key value selected in step b);
d) compiling a second database of transaction records taken from the first database that contain the selected first key value;
e) selecting at least one other key value from the transaction record selected in step a);
f) compiling a list of queried key values into a key value query database;
g) querying the first database for transaction records having the other key value selected in step e); and
h) adding the results of step g) to the second database.
2. A method according to claim 1, further comprising the steps of:
i) comparing a selected query of key values against the key value query database, wherein if a query containing a selected key value has been run, a query with that selected key value will not be run again.
3. A method according to claim 2, wherein said key value query database is written in a structured query language.
4. A method according to claim 3, wherein each query in the key value query database is assigned a run value indicative of whether the query has been run against the first database.
5. A method according to claim 1, wherein at least steps b)-d) are repeated with a new key value from the transaction record selected in step a).
6. A method according to claim 5, wherein at least steps b)-g) are repeated with a new key value from the first database.
7. A method according to claim 6, further comprising the step of assigning a risk coefficient to a transaction record in the second database based on the number of queried key values a given transaction record evidences.
8. A method according to claim 6, further comprising the step of assigning a risk coefficient to a transaction record in the second database based on the number of transaction records in the second database having a given matching key value.
9. A method according to claim 5, further comprising the step of assigning a risk coefficient to a transaction record in the second database based on the number of queried key values a given transaction record evidences.
10. A method according to claim 5, further comprising the step of assigning a risk coefficient to a transaction record in the second database based on the number of transaction records in the second database having a given matching key value.
11. A method according to claim 1, wherein at least steps b)-g) are repeated with a new key value from the first database.
12. A method according to claim 11, further comprising the step of assigning a risk coefficient to a transaction record in the second database based on the number of queried key values a given transaction record evidences.
13. A method according to claim 11, further comprising the step of assigning a risk coefficient to a transaction record in the second database based on the number of transaction records in the second database having a given matching key value.
14. A method according to claim 1, wherein the key values of the transaction records in the first database comprise identification data.
15. A method according to claim 14, wherein the identification data corresponds to at least one of a credit card number, a bank account number, a name, an address, an e-mail address, a telephone number, a fax number, a social security number, a merchant identification number, and a product identification number.
16. A method according to claim 1, further comprising the steps of selecting a transaction record from the second database; selecting a third key value from the transaction record selected from the second database, the third key value being distinct from the first and second key values; and querying the first database for other transaction records having the third key value.
17. A method of detecting fraudulent or erroneous data from a transaction data set, comprising the steps of:
a) selecting a transaction record from a first database comprising a plurality of transaction records for detecting fraudulent or erroneous data, each of the plurality of transaction records having a plurality of key values;
b) selecting a first key value from the transaction record selected in step a);
c) querying the first database for transaction records having the same or related first key value selected in step b);
d) compiling the results of step c) to a second database;
e) selecting at least one other key value from the transaction record selected in step a);
f) compiling a list of queried key values into a key value query database;
g) querying the first database for transaction records having the other key value selected in step e); and
h) adding the results of step g) to the second database.
18. A method according to claim 17, further comprising:
i) comparing a selected query of key values against the key value query database, wherein if a query containing a selected key value has been run, a query with that selected key value will not be run again.
19. A method according to claim 17, further comprising:
assigning a risk coefficient to a transaction record in the second database.
20. A method according to claim 17, wherein the key values of the transaction records in the first database comprise identification data.
21. A method of detecting fraudulent or erroneous data from a transaction data set, comprising:
selecting at least one transaction record containing possible fraudulent or erroneous data from a first database comprising a plurality of transaction records, each of the plurality of transaction records having a plurality of key values;
selecting at least one key value from the selected at least one transaction record;
querying the first database for transaction records having the same or related at least one selected key value;
compiling the querying results into a second database; and
adding the queried at least one key value into a key value query database.
22. A method according to claim 21, further comprising:
comparing a selected query of key values against the key value query database, wherein if a query containing a selected key value has been run, a query with that selected key value will not be run again.
23. A method according to claim 21, further comprising:
assigning a risk coefficient to a transaction record in the second database.
24. A method according to claim 21, wherein the key values of the transaction records in the first database comprise identification data.
US10/640,826 2003-08-13 2003-08-13 Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements Active 2025-07-19 US7373669B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/640,826 US7373669B2 (en) 2003-08-13 2003-08-13 Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/640,826 US7373669B2 (en) 2003-08-13 2003-08-13 Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements

Publications (2)

Publication Number Publication Date
US20050039036A1 US20050039036A1 (en) 2005-02-17
US7373669B2 true US7373669B2 (en) 2008-05-13

Family

ID=34136180

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/640,826 Active 2025-07-19 US7373669B2 (en) 2003-08-13 2003-08-13 Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements

Country Status (1)

Country Link
US (1) US7373669B2 (en)

Cited By (100)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070069006A1 (en) * 2005-09-02 2007-03-29 Honda Motor Co., Ltd. Automated Handling of Exceptions in Financial Transaction Records
US20070100716A1 (en) * 2005-09-02 2007-05-03 Honda Motor Co., Ltd. Financial Transaction Controls Using Sending And Receiving Control Data
US20070100717A1 (en) * 2005-09-02 2007-05-03 Honda Motor Co., Ltd. Detecting Missing Records in Financial Transactions by Applying Business Rules
US20080005037A1 (en) * 2006-06-19 2008-01-03 Ayman Hammad Consumer authentication system and method
US20080319869A1 (en) * 2007-06-25 2008-12-25 Mark Carlson Systems and methods for secure and transparent cardless transactions
US20080319904A1 (en) * 2007-06-25 2008-12-25 Mark Carlson Seeding challenges for payment transactions
US20090024630A1 (en) * 2005-06-20 2009-01-22 Kraft Harold H Privacy Information Reporting Systems with Broad Search Scope and Integration
US7546271B1 (en) 2007-12-20 2009-06-09 Choicepoint Asset Company Mortgage fraud detection systems and methods
US20100114776A1 (en) * 2008-11-06 2010-05-06 Kevin Weller Online challenge-response
US20100235908A1 (en) * 2009-03-13 2010-09-16 Silver Tail Systems System and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Analysis
US20100235909A1 (en) * 2009-03-13 2010-09-16 Silver Tail Systems System and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Velocity Analysis
US8571937B2 (en) 2010-10-20 2013-10-29 Playspan Inc. Dynamic payment optimization apparatuses, methods and systems
US8577803B2 (en) 2011-06-03 2013-11-05 Visa International Service Association Virtual wallet card selection apparatuses, methods and systems
US20140143010A1 (en) * 2012-11-16 2014-05-22 SPF, Inc. System and Method for Assessing Interaction Risks Potentially Associated with Transactions Between a Client and a Provider
US8788407B1 (en) 2013-03-15 2014-07-22 Palantir Technologies Inc. Malware data clustering
US8817984B2 (en) 2011-02-03 2014-08-26 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US8855999B1 (en) 2013-03-15 2014-10-07 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US8930897B2 (en) 2013-03-15 2015-01-06 Palantir Technologies Inc. Data integration tool
US8973102B2 (en) 2012-06-14 2015-03-03 Ebay Inc. Systems and methods for authenticating a user and device
US9009827B1 (en) 2014-02-20 2015-04-14 Palantir Technologies Inc. Security sharing system
US9021260B1 (en) 2014-07-03 2015-04-28 Palantir Technologies Inc. Malware data item analysis
US9043894B1 (en) 2014-11-06 2015-05-26 Palantir Technologies Inc. Malicious software detection in a computing system
US9117225B2 (en) 2011-09-16 2015-08-25 Visa International Service Association Apparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US9202249B1 (en) 2014-07-03 2015-12-01 Palantir Technologies Inc. Data item clustering and analysis
US9230280B1 (en) 2013-03-15 2016-01-05 Palantir Technologies Inc. Clustering data based on indications of financial malfeasance
US9355393B2 (en) 2011-08-18 2016-05-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9361597B2 (en) 2010-10-19 2016-06-07 The 41St Parameter, Inc. Variable risk engine
US9367872B1 (en) 2014-12-22 2016-06-14 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9454785B1 (en) 2015-07-30 2016-09-27 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US9535974B1 (en) 2014-06-30 2017-01-03 Palantir Technologies Inc. Systems and methods for identifying key phrase clusters within documents
US9552615B2 (en) 2013-12-20 2017-01-24 Palantir Technologies Inc. Automated database analysis to detect malfeasance
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9635046B2 (en) 2015-08-06 2017-04-25 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US9646291B2 (en) 2011-05-11 2017-05-09 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US9652765B2 (en) 2008-08-26 2017-05-16 Visa International Service Association System and method for implementing financial assistance programs
US9703983B2 (en) 2005-12-16 2017-07-11 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US9710807B2 (en) 2011-08-18 2017-07-18 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods and systems
US9747639B1 (en) * 2010-09-01 2017-08-29 Federal Home Loan Mortgage Corporation (Freddie Mac) Systems and methods for measuring data quality over time
US9754311B2 (en) 2006-03-31 2017-09-05 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US9773212B2 (en) 2011-02-28 2017-09-26 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
US9785773B2 (en) 2014-07-03 2017-10-10 Palantir Technologies Inc. Malware data item analysis
US9817563B1 (en) 2014-12-29 2017-11-14 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US9830328B2 (en) 2012-02-02 2017-11-28 Visa International Service Association Multi-source, multi-dimensional, cross-entry, multimedia merchant analytics database platform apparatuses, methods and systems
US9875293B2 (en) 2014-07-03 2018-01-23 Palanter Technologies Inc. System and method for news events detection and visualization
US9898509B2 (en) 2015-08-28 2018-02-20 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US9898528B2 (en) 2014-12-22 2018-02-20 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US9948629B2 (en) 2009-03-25 2018-04-17 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9953378B2 (en) 2012-04-27 2018-04-24 Visa International Service Association Social checkout widget generation and integration apparatuses, methods and systems
US9953334B2 (en) 2011-02-10 2018-04-24 Visa International Service Association Electronic coupon issuance and redemption apparatuses, methods and systems
US9965937B2 (en) 2013-03-15 2018-05-08 Palantir Technologies Inc. External malware data item clustering and analysis
US9990631B2 (en) 2012-11-14 2018-06-05 The 41St Parameter, Inc. Systems and methods of global identification
US9996838B2 (en) 2011-03-04 2018-06-12 Visa International Service Association Cloud service facilitator apparatuses, methods and systems
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10096022B2 (en) 2011-12-13 2018-10-09 Visa International Service Association Dynamic widget generator apparatuses, methods and systems
US10103953B1 (en) 2015-05-12 2018-10-16 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US10121129B2 (en) 2011-07-05 2018-11-06 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US10120857B2 (en) 2013-03-15 2018-11-06 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US10154084B2 (en) 2011-07-05 2018-12-11 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
US10162887B2 (en) 2014-06-30 2018-12-25 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US10204327B2 (en) 2011-02-05 2019-02-12 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
US10223691B2 (en) 2011-02-22 2019-03-05 Visa International Service Association Universal electronic payment apparatuses, methods and systems
US10223710B2 (en) 2013-01-04 2019-03-05 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US10230746B2 (en) 2014-01-03 2019-03-12 Palantir Technologies Inc. System and method for evaluating network threats and usage
US10235461B2 (en) 2017-05-02 2019-03-19 Palantir Technologies Inc. Automated assistance for generating relevant and valuable search results for an entity of interest
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US10262148B2 (en) 2012-01-09 2019-04-16 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US10275778B1 (en) 2013-03-15 2019-04-30 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic malfeasance clustering of related data in various data structures
US10318630B1 (en) 2016-11-21 2019-06-11 Palantir Technologies Inc. Analysis of large bodies of textual data
US10318941B2 (en) 2011-12-13 2019-06-11 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US10325224B1 (en) 2017-03-23 2019-06-18 Palantir Technologies Inc. Systems and methods for selecting machine learning training data
US10356032B2 (en) 2013-12-26 2019-07-16 Palantir Technologies Inc. System and method for detecting confidential information emails
US10362133B1 (en) 2014-12-22 2019-07-23 Palantir Technologies Inc. Communication data processing architecture
US10366360B2 (en) 2012-11-16 2019-07-30 SPF, Inc. System and method for identifying potential future interaction risks between a client and a provider
US10417637B2 (en) 2012-08-02 2019-09-17 The 41St Parameter, Inc. Systems and methods for accessing records via derivative locators
US10438176B2 (en) 2011-07-17 2019-10-08 Visa International Service Association Multiple merchant payment processor platform apparatuses, methods and systems
US10453066B2 (en) 2003-07-01 2019-10-22 The 41St Parameter, Inc. Keystroke analysis
US10482382B2 (en) 2017-05-09 2019-11-19 Palantir Technologies Inc. Systems and methods for reducing manufacturing failure rates
US10489391B1 (en) 2015-08-17 2019-11-26 Palantir Technologies Inc. Systems and methods for grouping and enriching data items accessed from one or more databases for presentation in a user interface
US10552994B2 (en) 2014-12-22 2020-02-04 Palantir Technologies Inc. Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US10572496B1 (en) 2014-07-03 2020-02-25 Palantir Technologies Inc. Distributed workflow system and database with access controls for city resiliency
US10572487B1 (en) 2015-10-30 2020-02-25 Palantir Technologies Inc. Periodic database search manager for multiple data sources
US10579647B1 (en) 2013-12-16 2020-03-03 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US10586227B2 (en) 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
US10606866B1 (en) 2017-03-30 2020-03-31 Palantir Technologies Inc. Framework for exposing network activities
US10620618B2 (en) 2016-12-20 2020-04-14 Palantir Technologies Inc. Systems and methods for determining relationships between defects
US10719527B2 (en) 2013-10-18 2020-07-21 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10838987B1 (en) 2017-12-20 2020-11-17 Palantir Technologies Inc. Adaptive and transparent entity screening
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US11063920B2 (en) 2011-02-03 2021-07-13 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US11119630B1 (en) 2018-06-19 2021-09-14 Palantir Technologies Inc. Artificial intelligence assisted evaluations and user interface for same
US11164206B2 (en) * 2018-11-16 2021-11-02 Comenity Llc Automatically aggregating, evaluating, and providing a contextually relevant offer
US11216468B2 (en) 2015-02-08 2022-01-04 Visa International Service Association Converged merchant processing apparatuses, methods and systems
US11288661B2 (en) 2011-02-16 2022-03-29 Visa International Service Association Snap mobile payment apparatuses, methods and systems
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US11308227B2 (en) 2012-01-09 2022-04-19 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US11314838B2 (en) 2011-11-15 2022-04-26 Tapad, Inc. System and method for analyzing user device information

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8392418B2 (en) * 2009-06-25 2013-03-05 University Of Tennessee Research Foundation Method and apparatus for predicting object properties and events using similarity-based information retrieval and model
GB0618627D0 (en) * 2006-09-21 2006-11-01 Vodafone Ltd Fraud detection system
US7631019B2 (en) * 2007-05-31 2009-12-08 Red Hat, Inc. Distributing data across different backing data stores
CA2689072C (en) * 2007-12-05 2018-01-09 Bce Inc. Methods and computer-readable media for facilitating forensic investigations of online transactions
US8032551B2 (en) * 2009-05-11 2011-10-04 Red Hat, Inc. Searching documents for successive hashed keywords
US8032550B2 (en) * 2009-05-11 2011-10-04 Red Hat, Inc. Federated document search by keywords
US8037076B2 (en) * 2009-05-11 2011-10-11 Red Hat, Inc. Federated indexing from hashed primary key slices
US8739125B2 (en) * 2009-06-16 2014-05-27 Red Hat, Inc. Automated and unattended process for testing software applications
US8396870B2 (en) * 2009-06-25 2013-03-12 University Of Tennessee Research Foundation Method and apparatus for predicting object properties and events using similarity-based information retrieval and modeling
US11797997B2 (en) * 2009-07-07 2023-10-24 Visa International Service Association Data verification in transactions in distributed network
EP2452303A4 (en) * 2009-07-07 2016-07-06 Finsphere Corp Mobile directory number and email verification of financial transactions
US8458069B2 (en) * 2011-03-04 2013-06-04 Brighterion, Inc. Systems and methods for adaptive identification of sources of fraud
US11624822B2 (en) * 2011-10-26 2023-04-11 Teledyne Flir, Llc Pilot display systems and methods
US9386078B2 (en) * 2014-05-30 2016-07-05 Ca, Inc. Controlling application programming interface transactions based on content of earlier transactions
US20160019297A1 (en) * 2014-07-15 2016-01-21 Datagence Inc. Method and apparatus for cloning a target list
US10203952B2 (en) 2015-11-18 2019-02-12 Sap Se Transparently splitting and rewriting data-base object bundles to database entities
US10417216B2 (en) * 2015-11-19 2019-09-17 Sap Se Determining an intersection between keys defining multi-dimensional value ranges
US10074362B2 (en) 2017-01-31 2018-09-11 Global Tel*Link Corporation System and method for assessing security threats and criminal proclivities
US10129392B1 (en) 2017-08-25 2018-11-13 Global Tel*Link Corporation Systems and methods for detecting inmate to inmate conference calls
US11143789B2 (en) * 2017-10-11 2021-10-12 Beyond Limits, Inc. Static engine and neural network for a cognitive reservoir system
EP3651100A1 (en) * 2018-11-09 2020-05-13 MasterCard International Incorporated Anomaly detection method for financial transactions
WO2020176977A1 (en) * 2019-03-01 2020-09-10 Mastercard Technologies Canada ULC Multi-page online application origination (oao) service for fraud prevention systems
WO2021062545A1 (en) 2019-10-01 2021-04-08 Mastercard Technologies Canada ULC Feature encoding in online application origination (oao) service for a fraud prevention system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6523019B1 (en) * 1999-09-21 2003-02-18 Choicemaker Technologies, Inc. Probabilistic record linkage model derived from training data
US20030154214A1 (en) * 2002-02-06 2003-08-14 Junh-Hsien Tu Automatic storage and retrieval system and method for operating the same
US20040030912A1 (en) * 2001-05-09 2004-02-12 Merkle James A. Systems and methods for the prevention of unauthorized use and manipulation of digital content

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2425488A1 (en) * 2000-10-12 2002-04-18 Iconix Pharmaceuticals, Inc Interactive correlation of compound information and genomic information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6523019B1 (en) * 1999-09-21 2003-02-18 Choicemaker Technologies, Inc. Probabilistic record linkage model derived from training data
US20040030912A1 (en) * 2001-05-09 2004-02-12 Merkle James A. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20030154214A1 (en) * 2002-02-06 2003-08-14 Junh-Hsien Tu Automatic storage and retrieval system and method for operating the same

Cited By (228)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11238456B2 (en) 2003-07-01 2022-02-01 The 41St Parameter, Inc. Keystroke analysis
US10453066B2 (en) 2003-07-01 2019-10-22 The 41St Parameter, Inc. Keystroke analysis
US11683326B2 (en) 2004-03-02 2023-06-20 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US20090024630A1 (en) * 2005-06-20 2009-01-22 Kraft Harold H Privacy Information Reporting Systems with Broad Search Scope and Integration
US8540140B2 (en) 2005-09-02 2013-09-24 Honda Motor Co., Ltd. Automated handling of exceptions in financial transaction records
US8095437B2 (en) * 2005-09-02 2012-01-10 Honda Motor Co., Ltd. Detecting missing files in financial transactions by applying business rules
US20070100716A1 (en) * 2005-09-02 2007-05-03 Honda Motor Co., Ltd. Financial Transaction Controls Using Sending And Receiving Control Data
US20070100717A1 (en) * 2005-09-02 2007-05-03 Honda Motor Co., Ltd. Detecting Missing Records in Financial Transactions by Applying Business Rules
US20070069006A1 (en) * 2005-09-02 2007-03-29 Honda Motor Co., Ltd. Automated Handling of Exceptions in Financial Transaction Records
US8099340B2 (en) 2005-09-02 2012-01-17 Honda Motor Co., Ltd. Financial transaction controls using sending and receiving control data
US10726151B2 (en) 2005-12-16 2020-07-28 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US9703983B2 (en) 2005-12-16 2017-07-11 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US10535093B2 (en) 2006-03-31 2020-01-14 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US11727471B2 (en) 2006-03-31 2023-08-15 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US11195225B2 (en) 2006-03-31 2021-12-07 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US9754311B2 (en) 2006-03-31 2017-09-05 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US10089679B2 (en) 2006-03-31 2018-10-02 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US20080005037A1 (en) * 2006-06-19 2008-01-03 Ayman Hammad Consumer authentication system and method
US8135647B2 (en) 2006-06-19 2012-03-13 Visa U.S.A. Inc. Consumer authentication system and method
US10089624B2 (en) 2006-06-19 2018-10-02 Visa U.S.A. Inc. Consumer authentication system and method
US11488150B2 (en) 2006-06-19 2022-11-01 Visa U.S.A. Inc. Consumer authentication system and method
US11107069B2 (en) 2006-06-19 2021-08-31 Visa U.S.A. Inc. Transaction authentication using network
US11783326B2 (en) 2006-06-19 2023-10-10 Visa U.S.A. Inc. Transaction authentication using network
US8121956B2 (en) 2007-06-25 2012-02-21 Visa U.S.A. Inc. Cardless challenge systems and methods
US8606700B2 (en) 2007-06-25 2013-12-10 Visa U.S.A., Inc. Systems and methods for secure and transparent cardless transactions
US8744958B2 (en) 2007-06-25 2014-06-03 Visa U. S. A. Inc. Systems and methods for secure and transparent cardless transactions
US10262308B2 (en) 2007-06-25 2019-04-16 Visa U.S.A. Inc. Cardless challenge systems and methods
US8706621B2 (en) 2007-06-25 2014-04-22 Visa U.S.A., Inc. Secure checkout and challenge systems and methods
US11481742B2 (en) 2007-06-25 2022-10-25 Visa U.S.A. Inc. Cardless challenge systems and methods
US8380629B2 (en) 2007-06-25 2013-02-19 Visa U.S.A. Inc. Seeding challenges for payment transactions
US20080319904A1 (en) * 2007-06-25 2008-12-25 Mark Carlson Seeding challenges for payment transactions
US8589291B2 (en) 2007-06-25 2013-11-19 Visa U.S.A. Inc. System and method utilizing device information
US8121942B2 (en) 2007-06-25 2012-02-21 Visa U.S.A. Inc. Systems and methods for secure and transparent cardless transactions
US20080319869A1 (en) * 2007-06-25 2008-12-25 Mark Carlson Systems and methods for secure and transparent cardless transactions
US20090164232A1 (en) * 2007-12-20 2009-06-25 Choicepoint Asset Company Mortgage fraud detection systems and methods
US7546271B1 (en) 2007-12-20 2009-06-09 Choicepoint Asset Company Mortgage fraud detection systems and methods
US20100241558A1 (en) * 2007-12-20 2010-09-23 LexisNexis, Inc. Mortgage fraud detection systems and methods
US9652765B2 (en) 2008-08-26 2017-05-16 Visa International Service Association System and method for implementing financial assistance programs
US8762279B2 (en) 2008-11-06 2014-06-24 Visa International Service Association Online challenge-response
US20100114776A1 (en) * 2008-11-06 2010-05-06 Kevin Weller Online challenge-response
US8533118B2 (en) 2008-11-06 2013-09-10 Visa International Service Association Online challenge-response
US9898740B2 (en) 2008-11-06 2018-02-20 Visa International Service Association Online challenge-response
US20100235908A1 (en) * 2009-03-13 2010-09-16 Silver Tail Systems System and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Analysis
US20100235909A1 (en) * 2009-03-13 2010-09-16 Silver Tail Systems System and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Velocity Analysis
US9948629B2 (en) 2009-03-25 2018-04-17 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US11750584B2 (en) 2009-03-25 2023-09-05 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US10616201B2 (en) 2009-03-25 2020-04-07 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US11017467B1 (en) * 2010-09-01 2021-05-25 Federal Home Loan Mortgage Corporation (Freddie Mac) Systems and methods for measuring data quality over time
US11556983B1 (en) 2010-09-01 2023-01-17 Federal Home Loan Mortgage Corporation (Freddie Mac) Systems and methods for measuring data quality over time
US9747639B1 (en) * 2010-09-01 2017-08-29 Federal Home Loan Mortgage Corporation (Freddie Mac) Systems and methods for measuring data quality over time
US9361597B2 (en) 2010-10-19 2016-06-07 The 41St Parameter, Inc. Variable risk engine
US9754256B2 (en) 2010-10-19 2017-09-05 The 41St Parameter, Inc. Variable risk engine
US10688385B2 (en) 2010-10-20 2020-06-23 Playspan Inc. In-application universal storefront apparatuses, methods and systems
US8571937B2 (en) 2010-10-20 2013-10-29 Playspan Inc. Dynamic payment optimization apparatuses, methods and systems
US10500481B2 (en) 2010-10-20 2019-12-10 Playspan Inc. Dynamic payment optimization apparatuses, methods and systems
US11311797B2 (en) 2010-10-20 2022-04-26 Playspan Inc. Dynamic payment optimization apparatuses, methods and systems
US9757644B2 (en) 2010-10-20 2017-09-12 Playspin Inc. Dynamic payment optimization apparatuses, methods and systems
US11063920B2 (en) 2011-02-03 2021-07-13 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US9559852B2 (en) 2011-02-03 2017-01-31 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US9979707B2 (en) 2011-02-03 2018-05-22 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US8817984B2 (en) 2011-02-03 2014-08-26 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US9294448B2 (en) 2011-02-03 2016-03-22 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US10178076B2 (en) 2011-02-03 2019-01-08 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US9722804B2 (en) 2011-02-03 2017-08-01 mSignia, Inc. Cryptographic security functions based on anticipated changes in dynamic minutiae
US10204327B2 (en) 2011-02-05 2019-02-12 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
US11093919B2 (en) 2011-02-05 2021-08-17 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
US9953334B2 (en) 2011-02-10 2018-04-24 Visa International Service Association Electronic coupon issuance and redemption apparatuses, methods and systems
US10621605B2 (en) 2011-02-10 2020-04-14 Visa International Service Association Electronic coupon issuance and redemption apparatuses, methods and systems
US11288661B2 (en) 2011-02-16 2022-03-29 Visa International Service Association Snap mobile payment apparatuses, methods and systems
US10586227B2 (en) 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
US10223691B2 (en) 2011-02-22 2019-03-05 Visa International Service Association Universal electronic payment apparatuses, methods and systems
US11023886B2 (en) 2011-02-22 2021-06-01 Visa International Service Association Universal electronic payment apparatuses, methods and systems
US10482398B2 (en) 2011-02-28 2019-11-19 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
US11250352B2 (en) 2011-02-28 2022-02-15 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
US9773212B2 (en) 2011-02-28 2017-09-26 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
US11263640B2 (en) 2011-03-04 2022-03-01 Visa International Service Association Cloud service facilitator apparatuses, methods and systems
US9996838B2 (en) 2011-03-04 2018-06-12 Visa International Service Association Cloud service facilitator apparatuses, methods and systems
US10489756B2 (en) 2011-05-11 2019-11-26 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US11263601B2 (en) 2011-05-11 2022-03-01 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US11853977B2 (en) 2011-05-11 2023-12-26 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US9646291B2 (en) 2011-05-11 2017-05-09 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US8577803B2 (en) 2011-06-03 2013-11-05 Visa International Service Association Virtual wallet card selection apparatuses, methods and systems
US10154084B2 (en) 2011-07-05 2018-12-11 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
US11010753B2 (en) 2011-07-05 2021-05-18 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US10419529B2 (en) 2011-07-05 2019-09-17 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
US10803449B2 (en) 2011-07-05 2020-10-13 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US10121129B2 (en) 2011-07-05 2018-11-06 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US11900359B2 (en) 2011-07-05 2024-02-13 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US10438176B2 (en) 2011-07-17 2019-10-08 Visa International Service Association Multiple merchant payment processor platform apparatuses, methods and systems
US11010756B2 (en) 2011-08-18 2021-05-18 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9355393B2 (en) 2011-08-18 2016-05-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US11803825B2 (en) 2011-08-18 2023-10-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10354240B2 (en) 2011-08-18 2019-07-16 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9959531B2 (en) 2011-08-18 2018-05-01 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US11763294B2 (en) 2011-08-18 2023-09-19 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US11037138B2 (en) 2011-08-18 2021-06-15 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods, and systems
US9710807B2 (en) 2011-08-18 2017-07-18 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods and systems
US11397931B2 (en) 2011-08-18 2022-07-26 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9117225B2 (en) 2011-09-16 2015-08-25 Visa International Service Association Apparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
US11354723B2 (en) 2011-09-23 2022-06-07 Visa International Service Association Smart shopping cart with E-wallet store injection search
US11314838B2 (en) 2011-11-15 2022-04-26 Tapad, Inc. System and method for analyzing user device information
US10846670B2 (en) 2011-12-13 2020-11-24 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US10318941B2 (en) 2011-12-13 2019-06-11 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US10096022B2 (en) 2011-12-13 2018-10-09 Visa International Service Association Dynamic widget generator apparatuses, methods and systems
US10685379B2 (en) 2012-01-05 2020-06-16 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US11308227B2 (en) 2012-01-09 2022-04-19 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US10262148B2 (en) 2012-01-09 2019-04-16 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US10262001B2 (en) 2012-02-02 2019-04-16 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems
US11074218B2 (en) 2012-02-02 2021-07-27 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems
US10430381B2 (en) 2012-02-02 2019-10-01 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems
US11036681B2 (en) 2012-02-02 2021-06-15 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia analytical model sharing database platform apparatuses, methods and systems
US10983960B2 (en) 2012-02-02 2021-04-20 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems
US10013423B2 (en) 2012-02-02 2018-07-03 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia analytical model sharing database platform apparatuses, methods and systems
US9830328B2 (en) 2012-02-02 2017-11-28 Visa International Service Association Multi-source, multi-dimensional, cross-entry, multimedia merchant analytics database platform apparatuses, methods and systems
US11886575B1 (en) 2012-03-01 2024-01-30 The 41St Parameter, Inc. Methods and systems for fraud containment
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US11010468B1 (en) 2012-03-01 2021-05-18 The 41St Parameter, Inc. Methods and systems for fraud containment
US10341344B2 (en) 2012-03-22 2019-07-02 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US10862889B2 (en) 2012-03-22 2020-12-08 The 41St Parameter, Inc. Methods and systems for persistent cross application mobile device identification
US10021099B2 (en) 2012-03-22 2018-07-10 The 41st Paramter, Inc. Methods and systems for persistent cross-application mobile device identification
US11683306B2 (en) 2012-03-22 2023-06-20 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US9953378B2 (en) 2012-04-27 2018-04-24 Visa International Service Association Social checkout widget generation and integration apparatuses, methods and systems
US8973102B2 (en) 2012-06-14 2015-03-03 Ebay Inc. Systems and methods for authenticating a user and device
US9396317B2 (en) 2012-06-14 2016-07-19 Paypal, Inc. Systems and methods for authenticating a user and device
US11301860B2 (en) 2012-08-02 2022-04-12 The 41St Parameter, Inc. Systems and methods for accessing records via derivative locators
US10417637B2 (en) 2012-08-02 2019-09-17 The 41St Parameter, Inc. Systems and methods for accessing records via derivative locators
US10395252B2 (en) 2012-11-14 2019-08-27 The 41St Parameter, Inc. Systems and methods of global identification
US11410179B2 (en) 2012-11-14 2022-08-09 The 41St Parameter, Inc. Systems and methods of global identification
US11922423B2 (en) 2012-11-14 2024-03-05 The 41St Parameter, Inc. Systems and methods of global identification
US10853813B2 (en) 2012-11-14 2020-12-01 The 41St Parameter, Inc. Systems and methods of global identification
US9990631B2 (en) 2012-11-14 2018-06-05 The 41St Parameter, Inc. Systems and methods of global identification
US20140143010A1 (en) * 2012-11-16 2014-05-22 SPF, Inc. System and Method for Assessing Interaction Risks Potentially Associated with Transactions Between a Client and a Provider
US10366360B2 (en) 2012-11-16 2019-07-30 SPF, Inc. System and method for identifying potential future interaction risks between a client and a provider
US10223710B2 (en) 2013-01-04 2019-03-05 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US9965937B2 (en) 2013-03-15 2018-05-08 Palantir Technologies Inc. External malware data item clustering and analysis
US10120857B2 (en) 2013-03-15 2018-11-06 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US9165299B1 (en) 2013-03-15 2015-10-20 Palantir Technologies Inc. User-agent data clustering
US9171334B1 (en) 2013-03-15 2015-10-27 Palantir Technologies Inc. Tax data clustering
US10264014B2 (en) 2013-03-15 2019-04-16 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic clustering of related data in various data structures
US10275778B1 (en) 2013-03-15 2019-04-30 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic malfeasance clustering of related data in various data structures
US8930897B2 (en) 2013-03-15 2015-01-06 Palantir Technologies Inc. Data integration tool
US10216801B2 (en) 2013-03-15 2019-02-26 Palantir Technologies Inc. Generating data clusters
US9177344B1 (en) 2013-03-15 2015-11-03 Palantir Technologies Inc. Trend data clustering
US9230280B1 (en) 2013-03-15 2016-01-05 Palantir Technologies Inc. Clustering data based on indications of financial malfeasance
US9135658B2 (en) 2013-03-15 2015-09-15 Palantir Technologies Inc. Generating data clusters
US8855999B1 (en) 2013-03-15 2014-10-07 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US8788407B1 (en) 2013-03-15 2014-07-22 Palantir Technologies Inc. Malware data clustering
US8818892B1 (en) 2013-03-15 2014-08-26 Palantir Technologies, Inc. Prioritizing data clusters with customizable scoring strategies
US8788405B1 (en) 2013-03-15 2014-07-22 Palantir Technologies, Inc. Generating data clusters with customizable analysis strategies
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
US11657299B1 (en) 2013-08-30 2023-05-23 The 41St Parameter, Inc. System and method for device identification and uniqueness
US10719527B2 (en) 2013-10-18 2020-07-21 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
US10579647B1 (en) 2013-12-16 2020-03-03 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US9552615B2 (en) 2013-12-20 2017-01-24 Palantir Technologies Inc. Automated database analysis to detect malfeasance
US10356032B2 (en) 2013-12-26 2019-07-16 Palantir Technologies Inc. System and method for detecting confidential information emails
US10230746B2 (en) 2014-01-03 2019-03-12 Palantir Technologies Inc. System and method for evaluating network threats and usage
US10805321B2 (en) 2014-01-03 2020-10-13 Palantir Technologies Inc. System and method for evaluating network threats and usage
US9009827B1 (en) 2014-02-20 2015-04-14 Palantir Technologies Inc. Security sharing system
US10873603B2 (en) 2014-02-20 2020-12-22 Palantir Technologies Inc. Cyber security sharing and identification system
US9923925B2 (en) 2014-02-20 2018-03-20 Palantir Technologies Inc. Cyber security sharing and identification system
US10162887B2 (en) 2014-06-30 2018-12-25 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US11341178B2 (en) 2014-06-30 2022-05-24 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US10180929B1 (en) 2014-06-30 2019-01-15 Palantir Technologies, Inc. Systems and methods for identifying key phrase clusters within documents
US9535974B1 (en) 2014-06-30 2017-01-03 Palantir Technologies Inc. Systems and methods for identifying key phrase clusters within documents
US9881074B2 (en) 2014-07-03 2018-01-30 Palantir Technologies Inc. System and method for news events detection and visualization
US9998485B2 (en) 2014-07-03 2018-06-12 Palantir Technologies, Inc. Network intrusion data item clustering and analysis
US10798116B2 (en) 2014-07-03 2020-10-06 Palantir Technologies Inc. External malware data item clustering and analysis
US9785773B2 (en) 2014-07-03 2017-10-10 Palantir Technologies Inc. Malware data item analysis
US9021260B1 (en) 2014-07-03 2015-04-28 Palantir Technologies Inc. Malware data item analysis
US9875293B2 (en) 2014-07-03 2018-01-23 Palanter Technologies Inc. System and method for news events detection and visualization
US9344447B2 (en) 2014-07-03 2016-05-17 Palantir Technologies Inc. Internal malware data item clustering and analysis
US10929436B2 (en) 2014-07-03 2021-02-23 Palantir Technologies Inc. System and method for news events detection and visualization
US10572496B1 (en) 2014-07-03 2020-02-25 Palantir Technologies Inc. Distributed workflow system and database with access controls for city resiliency
US9202249B1 (en) 2014-07-03 2015-12-01 Palantir Technologies Inc. Data item clustering and analysis
US10728350B1 (en) 2014-10-14 2020-07-28 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11240326B1 (en) 2014-10-14 2022-02-01 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11895204B1 (en) 2014-10-14 2024-02-06 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US9558352B1 (en) 2014-11-06 2017-01-31 Palantir Technologies Inc. Malicious software detection in a computing system
US9043894B1 (en) 2014-11-06 2015-05-26 Palantir Technologies Inc. Malicious software detection in a computing system
US10135863B2 (en) 2014-11-06 2018-11-20 Palantir Technologies Inc. Malicious software detection in a computing system
US10728277B2 (en) 2014-11-06 2020-07-28 Palantir Technologies Inc. Malicious software detection in a computing system
US11252248B2 (en) 2014-12-22 2022-02-15 Palantir Technologies Inc. Communication data processing architecture
US10362133B1 (en) 2014-12-22 2019-07-23 Palantir Technologies Inc. Communication data processing architecture
US9898528B2 (en) 2014-12-22 2018-02-20 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US10552994B2 (en) 2014-12-22 2020-02-04 Palantir Technologies Inc. Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US9589299B2 (en) 2014-12-22 2017-03-07 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9367872B1 (en) 2014-12-22 2016-06-14 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US10447712B2 (en) 2014-12-22 2019-10-15 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9817563B1 (en) 2014-12-29 2017-11-14 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US10552998B2 (en) 2014-12-29 2020-02-04 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US11941008B2 (en) 2015-02-08 2024-03-26 Visa International Service Association Converged merchant processing apparatuses, methods and systems
US11216468B2 (en) 2015-02-08 2022-01-04 Visa International Service Association Converged merchant processing apparatuses, methods and systems
US10103953B1 (en) 2015-05-12 2018-10-16 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US9454785B1 (en) 2015-07-30 2016-09-27 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US10223748B2 (en) 2015-07-30 2019-03-05 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US11501369B2 (en) 2015-07-30 2022-11-15 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US10484407B2 (en) 2015-08-06 2019-11-19 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US9635046B2 (en) 2015-08-06 2017-04-25 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US10489391B1 (en) 2015-08-17 2019-11-26 Palantir Technologies Inc. Systems and methods for grouping and enriching data items accessed from one or more databases for presentation in a user interface
US11048706B2 (en) 2015-08-28 2021-06-29 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US9898509B2 (en) 2015-08-28 2018-02-20 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US10346410B2 (en) 2015-08-28 2019-07-09 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US10572487B1 (en) 2015-10-30 2020-02-25 Palantir Technologies Inc. Periodic database search manager for multiple data sources
US10318630B1 (en) 2016-11-21 2019-06-11 Palantir Technologies Inc. Analysis of large bodies of textual data
US11681282B2 (en) 2016-12-20 2023-06-20 Palantir Technologies Inc. Systems and methods for determining relationships between defects
US10620618B2 (en) 2016-12-20 2020-04-14 Palantir Technologies Inc. Systems and methods for determining relationships between defects
US10325224B1 (en) 2017-03-23 2019-06-18 Palantir Technologies Inc. Systems and methods for selecting machine learning training data
US11481410B1 (en) 2017-03-30 2022-10-25 Palantir Technologies Inc. Framework for exposing network activities
US10606866B1 (en) 2017-03-30 2020-03-31 Palantir Technologies Inc. Framework for exposing network activities
US11947569B1 (en) 2017-03-30 2024-04-02 Palantir Technologies Inc. Framework for exposing network activities
US11210350B2 (en) 2017-05-02 2021-12-28 Palantir Technologies Inc. Automated assistance for generating relevant and valuable search results for an entity of interest
US11714869B2 (en) 2017-05-02 2023-08-01 Palantir Technologies Inc. Automated assistance for generating relevant and valuable search results for an entity of interest
US10235461B2 (en) 2017-05-02 2019-03-19 Palantir Technologies Inc. Automated assistance for generating relevant and valuable search results for an entity of interest
US10482382B2 (en) 2017-05-09 2019-11-19 Palantir Technologies Inc. Systems and methods for reducing manufacturing failure rates
US11537903B2 (en) 2017-05-09 2022-12-27 Palantir Technologies Inc. Systems and methods for reducing manufacturing failure rates
US11954607B2 (en) 2017-05-09 2024-04-09 Palantir Technologies Inc. Systems and methods for reducing manufacturing failure rates
US10838987B1 (en) 2017-12-20 2020-11-17 Palantir Technologies Inc. Adaptive and transparent entity screening
US11119630B1 (en) 2018-06-19 2021-09-14 Palantir Technologies Inc. Artificial intelligence assisted evaluations and user interface for same
US11847668B2 (en) * 2018-11-16 2023-12-19 Bread Financial Payments, Inc. Automatically aggregating, evaluating, and providing a contextually relevant offer
US20220027934A1 (en) * 2018-11-16 2022-01-27 Comenity Llc Automatically aggregating, evaluating, and providing a contextually relevant offer
US11164206B2 (en) * 2018-11-16 2021-11-02 Comenity Llc Automatically aggregating, evaluating, and providing a contextually relevant offer

Also Published As

Publication number Publication date
US20050039036A1 (en) 2005-02-17

Similar Documents

Publication Publication Date Title
US7373669B2 (en) Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements
US20090024630A1 (en) Privacy Information Reporting Systems with Broad Search Scope and Integration
US10769290B2 (en) Systems and methods for fraud detection via interactive link analysis
US9792324B2 (en) Method and system for uniquely identifying a person to the exclusion of all others
JP5824084B2 (en) Data recording in graph-based calculations
US20020035561A1 (en) Method and system for database query
US7240363B1 (en) System and method for thwarting identity theft and other identity misrepresentations
US7540021B2 (en) System and methods for an identity theft protection bot
CA2471940C (en) Real time data warehousing
US20080109875A1 (en) Identity information services, methods, devices, and systems background
US20140344130A1 (en) Systems And Methods For Automated Political Risk Management
US8788480B2 (en) Multiple candidate selection in an entity resolution system
US7519587B2 (en) Method, system, apparatus, program code, and means for determining a relevancy of information
WO2006104572A2 (en) Database structure for financial products with unique, consistent identifier for parties that assume roles with respect to the products and methods of using the database structure
US20080183618A1 (en) Global government sanctions systems and methods
KR102080769B1 (en) System and method for mining financial information based on private finanacial code
Gabor-Toth et al. Linking Deutsche Bundesbank Company Data
LoPucki The Spearing Tool Filing System Disaster
Fienberg Homeland insecurity: data mining, privacy, disclosure limitation, and the hunt for terrorists
Lehman et al. Detecting occupational fraud: billing schemes
AU2015249134A1 (en) Fuzzy data operations
Fredrickson Amending UCC Article 9 to Fix the Name-Error Problem
GB2366877A (en) A system for categorising and indexing documents
Fienberg STATISTICAL METHODS IN ECOMMERCE RESEARCH
Fienberg HOMELAND INSECURITY

Legal Events

Date Code Title Description
AS Assignment

Owner name: THE 41ST PARAMETER INC., ARIZONA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EISEN, ORI;REEL/FRAME:015790/0826

Effective date: 20050316

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 8

SULP Surcharge for late payment

Year of fee payment: 7

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12